The Leyka plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.30.3 via the 'leyka_ajax_get_env_and_options' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including Sberbank API key and password, PayPal Client Secret, and more keys and passwords.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-54754 The Leyka plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.30.3 via the 'leyka_ajax_get_env_and_options' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including Sberbank API key and password, PayPal Client Secret, and more keys and passwords.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Feb 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-02-05T19:29:08.894Z

Reserved: 2023-09-12T14:51:23.730Z

Link: CVE-2023-4917

cve-icon Vulnrichment

Updated: 2024-08-02T07:44:52.230Z

cve-icon NVD

Status : Modified

Published: 2023-09-13T03:15:09.457

Modified: 2024-11-21T08:36:15.707

Link: CVE-2023-4917

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.